Product / Detect & Respond

Run Hundreds of Detection Rules at Scale

Streaming detection engine runs hundreds of rules simultaneously without scanning the same data repeatedly. Start with 400+ out-of-the-box rules or write custom detections as code.

400+

Out-of-the-box detection rules

20+

Log sources covered

<100ms

Detection check latency

<5min

Setup time to first detection

From zero to detection coverage in minutes

Import pre-built rules, test safely, route alerts, and investigate fast.

Step 1:

Import pre-built detection rules

Start with 400+ out-of-the-box detection rules covering 20+ log sources. Connect a GitHub repository, select which rules to sync, and Scanner automatically keeps them updated as the community improves them.

Covers AWS, GCP, Azure, Okta, GitHub, M365, Slack, Snowflake, and more. Each rule includes descriptions, severity levels, and recommended alert routing.

Step 2:

Write custom rules your way

Create rules from scratch in the Scanner UI, duplicate and modify existing OOTB rules, or write rules in YAML and version control them in GitHub. Use the same query language you already know from search.

GitHub-based rules sync automatically. Test detection logic in your CI/CD pipeline and require code review before deploying to production.

Step 3:

Route alerts where your team works

Send critical alerts to PagerDuty for immediate on-call response. Medium-severity alerts go to Slack for team awareness. Low-priority alerts go to your ticketing system. Configure routing by severity level.

Alerts include context about what happened and link directly to investigation. Integrate with Slack, Microsoft Teams, PagerDuty, Jira, or any system via webhooks.

Step 4:

Investigate alerts efficiently

Click an alert and immediately see what matters: the event data, who was involved, and what happened. No digging through rule metadata or running manual queries to understand the incident.

Click any field value to investigate further—see all related activity from that user or IP, filter to similar events, or jump straight to raw logs. Investigation happens in the same tool where the alert fired.

Built for fast-moving security teams

Everything you need to detect, investigate, and respond to threats.

Version control

Manage detection rules in GitHub alongside your code. Review changes, test in CI/CD, and deploy with confidence.

Write rules your way

Use the same query language you already know from search. Complex logic, time-range correlations, cross-log queries—it all works.

Alert to investigation in one click

Every alert links directly to investigation. See what triggered, pivot to related activity, and drill into raw logs without switching tools.

Run rules as often as needed

Check critical detections every minute or run compliance checks daily. Each rule runs independently at its own frequency.

Stop alert fatigue

Automatically group repeat alerts into single notifications. No more being woken up 50 times for the same issue.

Never miss delayed logs

Handles logs that arrive late or out of order. Automatically re-evaluates and alerts if delayed data crosses thresholds.

Scanner unlocks the power of your security data

A cloud-native security data lake that never slows down, never drops data, and gives you complete control.

Architecture

Streaming Detection Engine

Detection rules run during indexing. Logs are processed against all rules simultaneously. Matching logs execute up to their first aggregation, and results are cached in a time-based rollup tree in S3.

Detection rules run during indexing. Logs are processed against all rules simultaneously. Matching logs execute up to their first aggregation, and results are cached in a time-based rollup tree in S3.

Docs: Technical Deep Dive
link_out
Performance

Query the cache, not raw logs

Detection workers query the rollup tree—a segment tree data structure optimized for time-range queries. Checking a 24-hour window reads only the minimal nodes needed. Queries complete in under 100ms.

500 rules checking every minute = 3.6TB queried daily vs 7.2PB with scheduled queries. ~2,000x more efficient.

Economics

Cost scales with volume, not rules

All rules share the same indexing pass. Adding detection rules doesn't require re-scanning logs. Cost scales with log volume, not rule count.

50 rules: Traditional $500/day, Scanner $50/day. 500 rules: Traditional $5,000/day, Scanner $75/day.

View Pricing

FAQ

Start Detecting Threats in Hours, Not Months

See how Scanner's streaming detection engine can give you comprehensive coverage without the traditional cost and complexity.

Book a Demo